How to wipe your Android device

Whether you just upgraded your Android smartphone to another device, your organization is finally replacing that old Android with something newer and shinier or you've decided to trade devices with a friend, it's

Published on: September 14th, 2011 Al Sacco

Mobile devices & medical research — protecting personal health information

By Dr. Ann Cavoukian Nothing disappoints me more than news of yet another lost unencrypted USB key or laptop containing personal health information. Unequivocally, there have been far too many breaches of this

Published on: September 13th, 2011 Ann Cavoukian

Finally, some statistics on the impact of cybercrime in Canada!

By Claudiu Popa   It’s about time. Since most companies do not benefit from security monitoring tools and technologies and many of those that do aren’t inclined to share their unfortunate events for fear

Published on: September 9th, 2011 Claudiu Popa

4 ways to keep you data centre cool in this scorching heat

Now that summer is in full swing, it's natural for IT shops to be concerned about keeping their data centres cool. But with limited budgets, keeping the data centre operating efficiently without blowing

Published on: July 22nd, 2011 Megan Santosus

LockItTight helps you recover stolen laptop

In the last month, two family members and one friend have had laptops stolen right out of their homes. Sadly, none of the systems were equipped with remote-monitoring software, meaning the chances of

Published on: July 20th, 2011 Rick Broida

Time to empower, not blame security’s ‘weakest link’

By Nestor E. Arellano It’s getting to be tiring hearing that tech users are data security’s weakest link. Recently we reported on a study released by Symantec Corp. which outlined the key differences

Published on: July 7th, 2011 Nestor Arellano

How to secure your iPad for the office

The iPad is one of the safest computing devices you can use. Its combination of hardware and software security translate to a device that's probably more secure than your PC or Mac--especially if

Published on: June 24th, 2011 Rich Mogull

A thought on cloud security…

By Brian Bourne There have been no shortage of Cloud service failures recently.  The latest being discussed in this ITBusiness article: “Dropbox drops the ball on account security”. So this raises the question.

Published on: June 22nd, 2011 Brian Bourne

Dropbox drops the ball on account security

Online storage service Dropbox made an embarrassing error Monday, turning off password authentication for millions of users.The company updated some code on the service just before 2:00 pm Monday, yet the new code

Published on: June 22nd, 2011 Robert Dutt

Something good out of LulzSec attacks

By Nestor E. Arellano In the simulated network attack used in the recently concluded SC Canada Congress security conference, organizers attributed the hypothetical theft of a fictitious company’s data to a secretive band

Published on: June 16th, 2011 Nestor Arellano

How SMBs can prepare for a cyber attack

Wading into e-commerce waters can be scary for small businesses because of cybersecurity threats, but they can take steps to protect themselves, a group of security experts said Monday. Small businesses using the

Published on: May 17th, 2011 Grant Gross

Video Rewind: The hard drive crusher

What do you do with your old PCs? You can donate it to a charitable group, or sell it or you can turn it into a lampshade. Whatever you decide, security experts advise

Published on: April 14th, 2011 Nestor Arellano

Epsilon was warned about phishing attack that caused data breach

The massive data breach at email service provider Epsilon may have been caused by a targeted spear-phishing campaign that the company should have known about for at least four months, Australian newspaper ITNews

Published on: April 8th, 2011 Jaikumar Vijayan

Strike a fair balance when monitoring employee PCs

 Do you know what your employees are doing on the Web? At a minimum, they're probably goofing off watching YouTube videos. At worst, they could be steering your company toward financial ruin. In

Published on: March 24th, 2011 Robert Strohmeyer